CVE-2020-7010

Elastic Cloud on Kubernetes (ECK) versions prior to 1.1.0 generate passwords using a weak random number generator. If an attacker is able to determine when the current Elastic Stack cluster was deployed they may be able to more easily brute force the Elasticsearch credentials generated by ECK.
References
Link Resource
https://www.elastic.co/community/security/ Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:elastic:elastic_cloud_on_kubernetes:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2020-06-03 18:15

Updated : 2024-02-10 03:00


NVD link : CVE-2020-7010

Mitre link : CVE-2020-7010

CVE.ORG link : CVE-2020-7010


JSON object : View

Products Affected

elastic

  • elastic_cloud_on_kubernetes
CWE
CWE-335

Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG)